Security

On Thursday, the pseudonymous operator of Bitcoin.org told the public on Twitter that the web portal has been “compromised.” The operator, Cobra, explained that the hackers were able to implement a bitcoin doubler scam model and stressed that the site would be down for a “few days.” Website Operator CobraContinue Reading

  Over the last few weeks, Bitcoin Cash (BCH) developers and community members have been discussing a pre-consensus method called Avalanche. Now BCH proponents have begun to notice the protocol has been applied to the Bchd full node implementation and the proof of concept officially running on the BCH mainnet. Also read: Mt.Continue Reading

Platforms providing traders with the opportunity to exchange cryptocurrencies have increasingly started to apply registration requirements. In many cases, these are justified on the basis of newly introduced KYC and AML regulations. Thankfully, there are still exchanges that allow users to swap digital coins without requiring a verified account. AlsoContinue Reading

  While U.S. investors are waiting for a bitcoin ETF to be approved, American financial regulators are looking to make the market more transparent. The Securities and Exchange Commission (SEC) is seeking a service that will identify the owners of wallet addresses for multiple cryptocurrencies. Also Read: Chainalysis: Two HackerContinue Reading

  A new report alleges that just two groups of hackers dominate the majority of cybercrime directed against cryptocurrency exchanges. Together, these groups have responsible for stealing about $1 billion of cryptocurrency so far. Also Read: Arwen Enables Self-Custody for Traders of Centralized Exchanges The Most Lucrative of All CryptoContinue Reading

The popular cryptocurrency software provider Blockchain has announced the launch of a custom hardware wallet that is exclusively tethered to the company’s flagship wallet. According to the development team behind the new hardware wallet called Lockbox, the firm collaborated with the wallet manufacturer Ledger in order to create the design. Continue Reading

Hundreds of startups are reportedly being “secretly” targeted by the U.S. Securities and Exchange Commission for their involvement with initial coin offerings. Companies that participated in ICOs are now scrambling to clarify whether their token constituted a security, and, if so, whether it was properly registered with or exempted byContinue Reading

Google has announced a number of upcoming changes concerning the development of new extensions for Chrome. Users of the web browser will soon benefit from improved security and better protection against malware including hidden miners and tools used to steal cryptocurrency. Also read: A Guide to Building Your Own CryptoContinue Reading

The Satoshi Revolution: A Revolution of Rising Expectations Section 4: State Versus Society Chapter 10, Part 6 Crypto’s Means are Its End, as Crypto-Statists Well Know The problem of the Means is, as I see it, a twofold problem: first, the problem of End and Means; second, the problem ofContinue Reading

Since the dawn of the Silk Road and the myriad of darknet markets (DNM) that followed, it’s been a cat and mouse game between law enforcement and DNM vendors and users. Also read: Proof-of-Stake is a Rebranded Version of the Old Financial System Operation Bayonet For a while, after the SilkContinue Reading

A US federal judge has ordered an alleged hacker to pay the equivalent of $750,000 in cryptocurrency for bail. The man was charged with hacking video game company Electronic Arts (EA), obtaining in-game currency used to buy and sell in-game items, and selling access to online games though black-market websites.Continue Reading

DNS attacks can manifest themselves in many ways, all targeted against the Domain Name System that connects the internet. At best they’re an inconvenience, knocking websites offline or preventing access, and at worst they’re costly, as this week’s $150,000 Myetherwallet hijack demonstrated. When you’re interacting in the crypto space, hereContinue Reading